{"id":"CVE-2019-2529","details":"Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.6.42 and prior, 5.7.24 and prior and 8.0.13 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).","modified":"2026-05-18T05:50:43.536839676Z","published":"2019-01-16T19:30:35.470Z","related":["ALSA-2019:2511","CGA-c92p-7h85-4928","SUSE-SU-2019:2048-1","SUSE-SU-2019:2118-1"],"database_specific":{"unresolved_ranges":[{"cpes":["cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*"],"source":"CPE_FIELD","vendor_product":"canonical:ubuntu_linux","extracted_events":[{"last_affected":"16.04"},{"last_affected":"18.04"},{"last_affected":"18.10"}]},{"extracted_events":[{"last_affected":"8.0"}],"source":"CPE_FIELD","vendor_product":"debian:debian_linux","cpes":["cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"]},{"cpes":["cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*","cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*"],"source":"CPE_FIELD","vendor_product":"netapp:oncommand_unified_manager","extracted_events":[{"introduced":"7.3"},{"introduced":"9.4"}]},{"extracted_events":[{"last_affected":"7.0"},{"last_affected":"8.0"}],"source":"CPE_FIELD","vendor_product":"redhat:enterprise_linux","cpes":["cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*"]},{"cpes":["cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_desktop:8.0:*:*:*:*:*:*:*"],"source":"CPE_FIELD","vendor_product":"redhat:enterprise_linux_desktop","extracted_events":[{"last_affected":"7.0"},{"last_affected":"8.0"}]},{"extracted_events":[{"last_affected":"8.1"},{"last_affected":"8.2"},{"last_affected":"8.4"},{"last_affected":"8.6"}],"source":"CPE_FIELD","vendor_product":"redhat:enterprise_linux_eus","cpes":["cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*"]},{"extracted_events":[{"last_affected":"7.0"},{"last_affected":"8.0"}],"source":"CPE_FIELD","vendor_product":"redhat:enterprise_linux_server","cpes":["cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_server:8.0:*:*:*:*:*:*:*"]},{"cpes":["cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*"],"source":"CPE_FIELD","vendor_product":"redhat:enterprise_linux_server_aus","extracted_events":[{"last_affected":"8.2"},{"last_affected":"8.4"},{"last_affected":"8.6"}]},{"cpes":["cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*"],"source":"CPE_FIELD","vendor_product":"redhat:enterprise_linux_server_tus","extracted_events":[{"last_affected":"8.2"},{"last_affected":"8.4"},{"last_affected":"8.6"}]},{"cpes":["cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_workstation:8.0:*:*:*:*:*:*:*"],"source":"CPE_FIELD","vendor_product":"redhat:enterprise_linux_workstation","extracted_events":[{"last_affected":"7.0"},{"last_affected":"8.0"}]}]},"references":[{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/106619"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:2327"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:2484"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:2511"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2019/02/msg00000.html"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201908-24"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20190118-0002/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3867-1/"},{"type":"FIX","url":"http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/mariadb/server","events":[{"introduced":"5bfe1a3917ee1bddc7f2cde0c88961875148873c"},{"fixed":"074d51e6151377928864f34b3d8f798b7e8c23d9"},{"introduced":"776555af021e917ce0d6235386b43ae59fdd5161"},{"fixed":"8aa4cff7b5bd3876138dbaf12cbcc7402c95cfa0"},{"introduced":"c235de12ae3723b96944337bd89ad9cc87f21d8f"},{"fixed":"4c490d6df63695dc97b2c808e59954e6877d3a51"}],"database_specific":{"extracted_events":[{"introduced":"5.5.0"},{"fixed":"5.5.63"},{"introduced":"10.0.0"},{"fixed":"10.0.38"},{"introduced":"10.1.0"},{"fixed":"10.1.38"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*"}}],"versions":["mariadb-10.1.37","mariadb-10.1.35","mariadb-10.1.34","mariadb-10.1.33","mariadb-10.1.32","mariadb-10.1.31","mariadb-10.1.30","mariadb-10.1.29","mariadb-10.1.28","mariadb-10.1.27","mariadb-10.1.26","mariadb-10.1.25","mariadb-10.1.24","mariadb-10.1.23","mariadb-10.1.22","mariadb-10.1.21","mariadb-10.1.20","mariadb-10.1.19","mariadb-10.1.18","mariadb-10.1.17","mariadb-10.1.16","mariadb-10.1.15","mariadb-10.1.14","mariadb-10.1.13","mariadb-10.1.12","mariadb-10.1.11","mariadb-10.1.10","mariadb-10.1.9","mariadb-10.1.8","mariadb-10.1.7","mariadb-10.1.6","mariadb-10.1.5","mariadb-10.1.4","mariadb-10.1.3","mariadb-10.1.2","mariadb-10.1.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-2529.json"}},{"ranges":[{"type":"GIT","repo":"https://github.com/mysql/mysql-server","events":[{"introduced":"0"},{"last_affected":"4789962c2f451b9bc7e9a1c29598bdea144edc47"},{"last_affected":"d2029238d6d9f648077664e4cdd611e231a6dc14"},{"introduced":"270fd3411e3d671a73ed9725940a30080f59ce6d"},{"last_affected":"e4924f36486f971f8a04252e01c803457a2c72f7"}],"database_specific":{"extracted_events":[{"introduced":"5.6.0"},{"last_affected":"5.6.42"},{"introduced":"5.7.0"},{"last_affected":"5.7.24"},{"introduced":"8.0.0"},{"last_affected":"8.0.13"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"}}],"versions":["mysql-5.7.24","mysql-5.6.42","mysql-8.0.13","mysql-5.6.40","mysql-5.1.4","mysql-4.0.4","mysql-4.0.2","mysql-3.23.36","mysql-3.23.33","mysql-3.23.32","mysql-3.23.31","mysql-3.23.30-gamma","mysql-3.23.28-gamma","mysql-3.23.22-beta"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-2529.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}